Stories by Matt Hines

While the problem of teen hacking remains a serious concern -- as highlighted in this previous post on the topic -- infiltrating the networks of kids involved in such activity, taking down their malware distribution Web sites, and convincing them to ...

IT industry giant HP is experiencing marked growth of its security business less than one year after re-launching a number of its products and services under its Secure Advantage brand, company executives claim.

Significant debate has recently been given over to the topic of whether or not younger workers will eschew jobs at companies that attempt to limit their access to popular Web sites and online applications, but some companies are already responding to...

Many companies spend a small fortune and deploy a small army to secure themselves from the many security threats lurking these days. But all those efforts can come to naught when making any of these common mistakes. The results can range from embarra...

Outsourcing, grid computing, and hacker professionalism are trends that cannot be stopped, and the sum total of those factors will have a dramatic effect on the way businesses attempt to protect their IT system in the future, researchers and analysts...

As the threat of attack, both external and internal, continues to take root and as data-handling regulations continue to proliferate, the role of a chief information security officer appears to be growing more complex by the day. Many CISOs are doing...

Microsoft is pushing the improved security of its Windows Server 2008 software package as one of the primary reasons why business customers should upgrade to the long-awaited product refresh as quickly as possible.

Phishers, cyber-squatters, and other online fraudsters continued their assault on well-known corporate brands over the last 12 months, increasing the burden on the companies being targeted and further frustrating consumers.

Even as social networking darling Facebook prepares a version of its online networking application aimed specifically at enterprise users, legions of security experts are getting behind the idea that the sites represent a serious threat to businesses...

Attackers continue to use well-worn techniques, such as SQL injection, to exploit holes in popular Web applications but have also moved on to other targets, including government sites, and newer exploit methods, such as cross-site request forgery, ac...

Mandiant introduced new incident response automation technology that promises to perform the first set of post-breach analysis tests the IT security company would provide via its breach investigation services.

As Apple continues to grow its worldwide market share and the company's products find their way into more business environments, attackers are certain to follow and create greater volumes of exploits aimed at vulnerabilities in the company's software...

Researchers at security gateway vendor Fortinet have uncovered an adware-distribution scheme being carried out on the Facebook social networking site considered to be the first attack propagated on the wildly popular online portal.

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited. Copyright 2013 IDG Communications.
ABN 14 001 592 650. All rights reserved.

Contact Us

With over 25 years of brand awareness and credibility, Good Gear Guide (formerly PC World Australia), consistently delivers editorial excellence through award-winning content and trusted product reviews.